Joomla! before 1.5.23 does not properly check for errors, which allows remote attackers to obtain sensitive information via unspecified vectors.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.joomla.org/announcements/release-news/5367-joomla-1523-released.html | patch |
http://www.openwall.com/lists/oss-security/2011/06/20/17 | mailing list patch |
http://www.osvdb.org/71587 | vdb entry |
http://secunia.com/advisories/44028 | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2011/06/23/4 | mailing list patch |
http://developer.joomla.org/security/news/9-security/10-core-security/340-20110401-core-information-disclosure.html |